team.salesteamlink.com Open in urlscan Pro
34.202.35.242  Malicious Activity! Public Scan

Submitted URL: https://team.salesteamlink.com/2f0fb356ebf1e7c7?l=72
Effective URL: https://team.salesteamlink.com/load_training?guid=250fb35f1bf1e7e4&correlation_id=26296c34-2770-438b-85d0-60d5fe6c8f7a
Submission: On December 07 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://team.salesteamlink.com/training/acceptance?correlation_id=26296c34-2770-438b-85d0-60d5fe6c8f7a

<form action="https://team.salesteamlink.com/training/acceptance?correlation_id=26296c34-2770-438b-85d0-60d5fe6c8f7a" id="training-form" method="post">
  <div style="text-align: center; margin-top: 20px;"><input class="myButton" data-text="acknowledge" type="submit" value="Got it! Thanks!"></div>
</form>

Text Content

 
 

This is a simulation sent from Baylor College of Medicine
The purpose of this simulation is to train users on how to recognize and respond
to suspicious phising emails. 

Data that was entered has NOT been recorded or stored, your safety is our
primary concern!



In order to keep the integrity of this test, please do not inform your
colleagues about this Phishing Campaign.

Please watch for the additional training that will be assigned to you via the
Learning Management System (LMS) in SuccessFactors


This type of phish is known as a Credential Harvesting Attack.
The hacker created a fake invitation and tricked you into providing credential
information for use in a future attack.

Here are some things to watch out for:
Always check for grammatical and spelling errors. Most legitimate sites do not
have multiple typos or broken sentence structure.
Be cautious of clicking on links from unknown senders or from unexpected
sources. Only enter sensitive information, such as passwords or banking
information, on sites you know and trust.
 
Always check the sender of the email. This email attempts to use a familar
experience to gets you to act. It could be a potential scam, using a common
experience as a to lull you into a false sense of security.
Always verify the sender through a reputable source before responding, such as
the Helpdesk or by using the "Report Phish" button in Outlook

Examples from this Phish
Email Callouts


Login Site Callouts
Please do not share your experience with colleagues, so they can learn too.
Click the button below to acknowledge and close out of this message